category
Strategies

Criminals target school data: top 10 security measures for educational institutions

Every educational institution should be aware that cyber criminals make money by stealing personal information and selling it on the black market to other criminals who turn the data into cash through a range of fraudulent schemes. Here are ten security measures schools should take to defend against this type of data crime.

Cyber Boot Camp and tomorrow’s cyber security professionals

The top three teams from the fifth annual Mayors’ Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North America for five days of hands-on security training and lectures from IT experts, law enforcement, and career advisors.

Encryption essential for cyber security: A million reasons to encrypt sensitive data

Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.

Business continuity management: key to securing your digital future

Business continuity management is the key to securing your company’s digital future despite disruptive incidents, from power outages and IT errors to fires, floods, tornadoes, earthquakes, and tsunamis.

STEM education, the Target data breach, and the Apple SSL vulnerability

Could holes in security code and major information systems in America be due, at least in part, to the dire state of education in subjects like Science, Technology, Engineering, and Mathematics (STEM)?

Why are so many kids still not receiving computer science education?

The city of Chicago recently announced a change to the curriculum for schools in their district that would introduce children as young as primary school to computer science concepts. It would also allow students to count computer science as a core subject that fulfills graduation requirements. What does this say about the current state of computer-related education?

Active Defense: Good protection doesn’t need to be offensive

Just Google for the search term ‘“active defense” startup’ and it is clear that this is a hot growth area in Internet security. But what is it, exactly? The answer to that question is difficult and controversial.

Mavericks gooses OS X 10.9 adoption rate

Will Apple’s recent move to offer OS X 10.9 Mavericks as a free update boost adoption and security? We could be seeing a new model of operating system upgrades emerging across numerous platforms.

The Preliminary NIST Cybersecurity Framework published and Workshop #5 scheduled

The newly published Preliminary Cybersecurity Framework from NIST, part of the federal effort to help critical infrastructure owners and operators reduce cybersecurity risks, is now available for review, with some interesting new language and a final workshop scheduled for November.

Is cybersecurity by fiat dead on arrival?

Are legislation and regulation a viable means of making people and organizations do better at securing data systems and devices? I’m not talking about FIAT the car maker, but fiat: “an official order given by someone who has power.” How’s that working in light of NIST CSF and HIPAA?

NIST cybersecurity framework: Your insurance company is watching

Cybersecurity insurance or “cyber insurance” was a hot topic at the latest NIST workshop on the critical infrastructure cybersecurity framework (CSF) in Dallas. Will the CSF become a standard used by insurers to determine rates?

NIST cybersecurity framework rolls on amid murmurs of regulation

What needs to happen before the President of the United States can stand before the American people and assure them that a comprehensive and good faith effort has been made to stop cyber attacks disrupting the delivery of essential goods and services? The NIST workshops are seeking answers to that question.

A cybersecurity framework to protect digital critical infrastructure

In the ongoing effort to protect cyber aspects of America’s critical infrastructure, the third NIST Cybersecurity Framework workshop is being hosted July 10-12, 2013 by the University of California, San Diego, and the National Health Information Sharing and Analysis Center.

Cyber security road map for businesses

Basic advice on cyber security survival for businesses is presented as a 6-step roadmap, along with links to free resources that can be useful in your efforts to defend your business.

Security warning for firms still using Windows XP as deadline looms

More than half of British companies could be at risk of cyber attack, after a survey found that IT departments had not begun the process of migrating from Windows XP- with just a year left before Microsoft stops offering support for the ageing OS.

Schneier, Winkler and the Great Security Awareness Training Debate

The value of educating people about cyber security is hotly debated these days, with opposing views on security awareness training coming from Bruce Schneier and Ira Winkler. Stephen Cobb weighs in.

Will of the WISP: Your company’s Written Information Security Program

Does your company have a written information security program? If not, you could be an easy target for cybercriminals AND end up on the wrong side of the law, regardless of where your company is located or what size it is. Which law? Something they passed about two years ago in the Commonwealth of Massachusetts,

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.